Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "breach (security exploit)"
- Status: Free
Campus BBVA
Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Attacks, Security Management, Security Information and Event Management (SIEM), Information Systems Security, Data Security, Incident Management, Cyber Threat Intelligence, Application Security, Computer Security Awareness Training, Intrusion Detection and Prevention, Information Technology Operations, Threat Management, Security Controls, Threat Detection, Malware Protection, Loss Prevention, Continuous Monitoring
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Cyber Security Policies, Investigation, Event Monitoring, Threat Detection, Contingency Planning, Communication Planning
Amazon Web Services
Skills you'll gain: Serverless Computing, Event-Driven Programming, Solution Architecture, Cloud Computing Architecture, Cloud Solutions, Identity and Access Management, Amazon Web Services, API Gateway, Hybrid Cloud Computing, Multi-Tenant Cloud Environments, Information Technology Architecture, Performance Tuning, Amazon DynamoDB, Amazon S3, Cloud Security, AWS Kinesis, Containerization
Google Cloud
Skills you'll gain: Identity and Access Management, Cloud Security, OAuth, Google Cloud Platform, Kubernetes, Cloud Storage, Security Controls, Application Security, Authorization (Computing), Data Security, Role-Based Access Control (RBAC), Hardening, Vulnerability Scanning, Encryption, Key Management, Virtual Machines
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Multi-Factor Authentication, Public Key Infrastructure, Mobile Security, Wireless Networks
University of Pennsylvania
Skills you'll gain: Data Ethics, Data Governance, Data Security, Governance, Business Strategy, Organizational Strategy, Business Transformation, Artificial Intelligence, Business Ethics, Analytics, Big Data, Machine Learning, Innovation, Algorithms
Skills you'll gain: ISO/IEC 27001, Risk Management, Personally Identifiable Information, Business Risk Management, Security Controls, System Implementation, Information Privacy, Security Management, Security Strategy
Google Cloud
Skills you'll gain: Cyber Operations, Security Management, Continuous Monitoring, Cybersecurity, Cyber Security Strategy, Threat Management, DevOps, Threat Detection, Cyber Security Assessment, Incident Response, Site Reliability Engineering, Digital Transformation, Agile Methodology, Automation
EIT Digital
Skills you'll gain: Data Security, Cryptography, Information Systems Security, Security Management, Data Access, Vulnerability Assessments, Encryption, Information Privacy, Data Management, Big Data, Authorization (Computing)
The Hong Kong University of Science and Technology
Skills you'll gain: Software Design Patterns, Requirements Analysis, Systems Development Life Cycle, Software Architecture, Acceptance Testing, Software Development Methodologies, Unified Modeling Language, Software Development Life Cycle, Configuration Management, Software Quality Assurance, Debugging, Engineering Software, Software Design, Process Driven Development, Software Engineering, Software Testing, Object Oriented Design, Functional Requirement, Data Modeling, Systems Design
Microsoft
Skills you'll gain: Data Storytelling, Power BI, Data Presentation, Dashboard, Data Visualization Software, Data Visualization, Microsoft Power Platform, Data Analysis, Creative Design, Data Mapping, Data Security
University of Colorado System
Skills you'll gain: Data Encryption Standard, Public Key Infrastructure, Cryptography, Cybersecurity, Public Key Cryptography Standards (PKCS), Key Management, Advanced Encryption Standard (AES), Encryption, Cryptographic Protocols, Authentications, Arithmetic, Algorithms, Applied Mathematics, Data Integrity, Probability
In summary, here are 10 of our most popular breach (security exploit) courses
- Cybersecurity for Tech Professionals:Â Campus BBVA
- Incident Response and Recovery:Â ISC2
- Architecting Solutions on AWS:Â Amazon Web Services
- Security Best Practices in Google Cloud:Â Google Cloud
- Introduction to IT Security:Â Akamai Technologies, Inc.
- AI Strategy and Governance:Â University of Pennsylvania
- Understanding ISO Security Standards for Your Organization:Â Codio
- Modern Security Operations:Â Google Cloud
- Security and Privacy for Big Data - Part 1:Â EIT Digital
- Software Engineering:Â The Hong Kong University of Science and Technology